First published: Tue Oct 15 2024(Updated: )
Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 2.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle MySQL Installer | >=8.4.0<=8.4.2 | |
Oracle MySQL Installer | =9.0.0 | |
Oracle MySQL Installer | =9.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21209 is classified as a difficult to exploit vulnerability that affects high privileged attackers with network access.
To fix CVE-2024-21209, you should upgrade MySQL to version 8.4.3 or higher, or 9.0.2 or higher.
CVE-2024-21209 affects MySQL versions 8.4.2 and prior, as well as 9.0.1 and prior.
CVE-2024-21209 can be exploited by a high privileged attacker with network access through multiple protocols.
CVE-2024-21209 specifically affects the MySQL Client product, particularly the mysqldump component.